Results for 'Confidentiality'

42 found
Order:
  1. Confidentiality and the professions.R. B. Edwards - 1988 - In Rem Blanchard Edwards & Glenn C. Graber (eds.), Bioethics. Harcourt, Wadsworth. pp. 72-81.
    This article is in a larger textbook of articles on Medical Ethics. It identifies a number of values that underlie professional commitments to confidentiality that are involved in protecting or promoting the client's (1) privacy, (2)social status, (3) economic advantages, (4) openness of communications, (5) seeking professional help, (6) trust in professionals, (7) autonomous control over personal information. The problem of making exceptions to confidentiality commitments is also examined.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Medical Ethics in the Light of Maqāṣid Al-Sharīʿah: A Case Study of Medical Confidentiality.Bouhedda Ghalia, Muhammad Amanullah, Luqman Zakariyah & Sayyed Mohamed Muhsin - 2018 - Intellectual Discourse 26 (1):133-160.
    : The Islamic jurists utilized the discipline of maqāṣid al-sharīʿah,in its capacity as the philosophy of Islamic law, in their legal and ethicalinterpretations, with added interest in addressing the issues of modern times.Aphoristically subsuming the major themes of the Sharīʿah, maqāṣid play apivotal role in the domain of decision-making and deduction of rulings onunprecedented ethical discourses. Ethics represent the infrastructure of Islamiclaw and the whole science of Islamic jurisprudence operates in the lightof maqāṣid to realize the ethics in people’s lives. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  51
    Developing an Islamic framework for medical confidentiality practice.S. M. Muhsin - 2021 - Islamic Insight Journal of Islamic Studies (Iijis) 4 (1):15-43.
    Arguably, ethical guidelines and medical laws on medical confidentiality have fallen short of extrapolating the methodology for dealing with potential ethical complexities in its practice. This drawback has made it difficult for physicians to prevent harm from occurring if it has not yet happened, remove harm if it has already taken place, or minimise harm if it is unavoidable. Therefore, this article attempts to outline certain principles in the form of a framework to govern the management of confidential information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  79
    (1 other version)Ethical Issues in Pre-Cancer Testing: The Parallel with Huntington's Disease.Donna L. Dickenson - 2002 - In K. W. M. Fulford, Donna Dickenson & Thomas H. Murray (eds.), Healthcare Ethics and Human Values: An Introductory Text with Readings and Case Studies. Malden, Mass.: Wiley-Blackwell. pp. 97.
    This article, based on a case study, examines issues of confidentiality and family impact in a diagnosis of Huntington's disease. Genetic-based illness transcends individualistic models of patient autonomy because it also involves other family members, requiring a new approach to patient confidentiality.
    Download  
     
    Export citation  
     
    Bookmark  
  6. A Larger Space for Moral Reflection.Judith Andre - 1998 - Ethical Currents (53):6-8.
    Margaret Urban Walker argues that hospital ethics committees should think of their task as "keeping moral space open." I develop her suggestion with analogies: Enlarge the windows (i.e., expand what counts as an ethical issue); add rooms and doors (i.e., choose particular issues to engage). Examples include confidentiality defined as information flow, and moral distress in the healthcare workplace.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Pulcinella secrets.Emilio Mordini - 2011 - Bioethics 25 (9):ii-iii.
    Pulcinella is one of the most ancient comic characters of the Commedia dell’Arte.1 He is the stereotypical lazy servant, insolent and chauvinist, sometimes stupid, sometimes clever, always penniless, and absolutely unable to keep any secret. In a typical Commedia dell’Arte plot, the master reveals a secret to Pulcinella, who is under oath never to disclose it. Needless to say, after swearing that he will never divulge it, Pulcinella soon acts in a very different way, telling the secret to everybody he (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. An African Theory of Bioethics: Reply to Macpherson and Macklin.Thaddeus Metz - 2010 - Developing World Bioethics 10 (3):158-163.
    In a prior issue of Developing World Bioethics, Cheryl Macpherson and Ruth Macklin critically engaged with an article of mine, where I articulated a moral theory grounded on indigenous values salient in the sub-Saharan region, and then applied it to four major issues in bioethics, comparing and contrasting its implications with those of the dominant Western moral theories, utilitarianism and Kantianism. In response to my essay, Macpherson and Macklin have posed questions about: whether philosophical justifications are something with which bioethicists (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  9. Not the doctor’s business: Privacy, personal responsibility and data rights in medical settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. The duty of doctors (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Afro-Communitarianism and the Role of Traditional African Healers in the COVID-19 Pandemic.Luís Cordeiro-Rodrigues & Thaddeus Metz - 2021 - Public Health Ethics 14 (1):59-71.
    The COVID-19 pandemic has brought significant challenges to healthcare systems worldwide, and in Africa, given the lack of resources, they are likely to be even more acute. The usefulness of Traditional African Healers in helping to mitigate the effects of pandemic has been neglected. We argue from an ethical perspective that these healers can and should have an important role in informing and guiding local communities in Africa on how to prevent the spread of COVID-19. Particularly, we argue not only (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  11. Fiduciary Duties and the Ethics of Public Apology.Alice MacLachlan - 2018 - Journal of Applied Philosophy 35 (2):359-380.
    The practice of official apology has a fairly poor reputation. Dismissed as ‘crocodile tears’ or cheap grace, such apologies are often seen by the public as an easy alternative to more punitive or expensive ways of taking real responsibility. I focus on what I call the role-playing criticism: the argument that someone who offers an apology in public cannot be appropriately apologetic precisely because they are only playing a role. I offer a qualified defence of official apologies against this objection, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  51
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Cunoaștere și Informații.Nicolae Sfetcu - 2016 - Drobeta Turnu Severin: MultiMedia Publishing.
    Cunoașterea și informațiile (abordate în ansamblu sau în componentele lor distincte) sunt o preocupare majoră pentru tehnologia informației, sisteme de informații, știința informației și activitatea de informații în general. Procesul obţinerii, prelucrării şi analizei informaţiilor este o preocupare majoră pentru societatea actuală. În acest scop se folosesc procedee şi tehnici specifice pentru culegerea sau generarea de informaţii, prelucrarea acestora prin analiză şi sinteză, generarea de predicţii şi strategii, transmisia şi prezentarea informaţiilor factorilor de decizie, şi stocarea lor. Analiza informațiilor poate (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  14. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. The Tarasoff rule: the implications of interstate variation and gaps in professional training.Rebecca Johnson, Govind Persad & Dominic Sisti - 2014 - Journal of the American Academy of Psychiatry and the Law Online 42 (4):469-477.
    Recent events have revived questions about the circumstances that ought to trigger therapists' duty to warn or protect. There is extensive interstate variation in duty to warn or protect statutes enacted and rulings made in the wake of the California Tarasoff ruling. These duties may be codified in legislative statutes, established in common law through court rulings, or remain unspecified. Furthermore, the duty to warn or protect is not only variable between states but also has been dynamic across time. In (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Embracing Change with All Four Arms: Post-Humanist Defense of Genetic Engineering.J. Hughes - 1996 - Eubios Journal of Asian and International Bioethics 6 (4):94-101.
    This paper sets out to defend human genetic engineering with a new bioethical approach, post-humanism, combined with a radical democratic political framework. Arguments for the restriction of human genetic engineering, and specifically germ-line enhancement, are reviewed. Arguments are divided into those which are fundamental matters of faith, or "bio-Luddite" arguments, and those which can be addressed through public policy, or "gene-angst" arguments.The four bio-Luddite concerns addressed are: Medicine Makes People Sick; There are Sacred Limits of the Natural Order; Technologies Always (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  18. Ethical issues concerning the use of commercially available wearables in children.Evangelos D. Protopapadakis & Andrie G. Panayiotou - 2022 - Jahr 13 (1):9-22.
    Wearable and mobile technology has advanced in leaps and bounds in the last decade with technological advances creating a role from enhancing healthy living to monitoring and treating disease. However, the discussion about the ethical use of such commercial technology in the community, especially in minors, is lacking behind. In this paper, we first summarize the major ethical concerns that arise from the usage of commercially available wearable technology in children, with a focus on smart watches, highlighting issues around the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. The Current State of Medical School Education in Bioethics, Health Law, and Health Economics.Govind C. Persad, Linden Elder, Laura Sedig, Leonardo Flores & Ezekiel J. Emanuel - 2008 - Journal of Law, Medicine and Ethics 36 (1):89-94.
    Current challenges in medical practice, research, and administration demand physicians who are familiar with bioethics, health law, and health economics. Curriculum directors at American Association of Medical Colleges-affiliated medical schools were sent confidential surveys requesting the number of required hours of the above subjects and the years in which they were taught, as well as instructor names. The number of relevant publications since 1990 for each named instructor was assessed by a PubMed search.In sum, teaching in all three subjects combined (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  20. Psychotherapy and the Restoration of Meaning: Existential Philosophy in Clinical Practice.Keith Markman, Peter Zafirides, Travis Proulx & Matthew Lindberg - 2013 - In Keith Douglas Markman, Travis Proulx & Matthew J. Lindberg (eds.), The Psychology of Meaning. Washington, D.C.: American Psychological Association. pp. 465-477.
    In this chapter, we explore how themes of existential philosophy have been used to develop a formal orientation of psychotherapy, and we discuss the main principles of existential psychotherapy and their application in practice. We also draw upon case examples to specifically illustrate how the approach of existential psychotherapy is utilized in clinical practice. In the case examples, each patient's identify has been disguised to maintain confidentiality. The new science of meaning, represented by the chapters in this volume, not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Science Advice in New Zealand: opportunities for development.Ben Jeffares - 2019 - Policy Quarterly 15 (2):62-71.
    What is the state of play for science advice to the government and Parliament? After almost ten years with a prime minister’s chief science advisor, are there lessons to be learnt? How can we continue to ensure that science advice is effective, balanced, transparent and rigorous, while at the same time balancing the need for discretion and confidentiality? In this article, we suggest that the hallmarks of good science – transparency and peer review – can be balanced against the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Review of Graeme Laurie, Genetic Privacy. [REVIEW]Donna Dickenson - 2003 - Journal of Medical Ethics 29:271-374.
    Review of Graeme Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms.
    Download  
     
    Export citation  
     
    Bookmark  
  23. Rethinking the ethical approach to health information management through narration: pertinence of Ricœur’s ‘little ethics’.Corine Mouton Dorey - 2016 - Medicine, Health Care and Philosophy 19 (4):531-543.
    The increased complexity of health information management sows the seeds of inequalities between health care stakeholders involved in the production and use of health information. Patients may thus be more vulnerable to use of their data without their consent and breaches in confidentiality. Health care providers can also be the victims of a health information system that they do not fully master. Yet, despite its possible drawbacks, the management of health information is indispensable for advancing science, medical care and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Patients, Corporate Attorneys, and Moral Obligations.Ioan-Radu Motoarca - 2022 - St. Mary’s Journal on Legal Malpractice and Ethics 12 (2):284-328.
    There are two main questions that any account of corporate lawyers’ moral obligations needs to answer: (1) Do corporate lawyers have moral obligations to third parties? and (2) In cases of conflict between obligations to the corporation and obligations to third parties, which should prevail? This Article offers answers to these questions in the context of lawyers working in medical corporations. I argue that lawyers do have moral obligations to third parties, and that in cases where patients’ rights are being (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  44
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. The Ethical Work that Regulations Will not Do.Carusi Annamaria & De Grandis Giovanni - 2012 - Information, Communication and Society 15 (1):124-141.
    Ethical concerns in e-social science are often raised with respect to privacy, confidentiality, anonymity and the ethical and legal requirements that govern research. In this article, the authors focus on ethical aspects of e-research that are not directly related to ethical regulatory framework or requirements. These frameworks are often couched in terms of benefits or harms that can be incurred by participants in the research. The authors shift the focus to the sources of value in terms of which benefits (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Privacy.Edmund Byrne - 1997 - In Byrne Edmund (ed.), Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. Professional relationships are (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  50
    Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication.Mohit Gangwar - 2024 - International Journal of Intelligent Systems and Applications in Engineering 12 (2):29-41.
    This work focuses on enhancing security for transmitted e-documents, such as e-stamp papers, within wireless environments through dynamic authentication using variable circular concealment of multiple invisible signature images. This method is driven by encrypted secret keys and session-based random numbers, alongside a region-specific bit casting strategy and dynamic bit sequencing for multiple signatures to bolster security and robustness. Multi-copy signature marking on non-overlapping document areas, coupled with varied bit encoding strategies for each modified pixel byte coefficient in cover image sub-blocks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Ethics for Records and Information Management.Norman A. Mooradian - 2018 - Chicago, IL, USA: American Library Association.
    The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a rigorous outline of such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  45
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH.Dhanang Witjaksono & Arimurti Kriswibowo - 2023 - Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38.
    The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in books, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Negotiating the Ethical Conduct of Educational Research in an Institutional Review Board Space: Perspectives from a University in Ethiopia.Ashenafi Alemu - 2019 - International Journal of African Higher Education 5 (1).
    Some international researchers assume that there is a lack of ethical review of research in many countries of the Global South. However, numerous African countries have recently introduced local and national research ethics guidelines. This article unpacks how ethical reviews of research in education are negotiated in a higher education institution in Ethiopia. It employs a critical analytical lens to challenge some of the assumptions of Beaty’s (2010) Institutional Review Board (IRB) stakeholder model. The article begins with a discussion of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Culture, Actors, and Resources Surrounding Undergraduate Bioethics Education in Sub-Saharan Africa.Elizabeth R. Bruce - 2019 - International Journal of African Higher Education 5 (1).
    Scientisationisagrowingtrendasindividualsworldwideharnessscientific tools and knowledge to solve problems. This phenomenon is evident in biomedical research, which has increased across sub-Saharan Africa, and when encountering bioethical issues arising during the course of such research. This research synthesis considers how the constructs of culture, actors, and resources in the region shape undergraduate bioethics education. Using a lens of sociological neo-institutionalism, taken-for-granted bioethical scripts, like informed consent and medical confidentiality, are evident in this education; however, actual implementation demonstrates the way they are often (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Professional Responsibility: A Deontological Case-Study Approach.Iñaki Xavier Larrauri Pertierra - 2019 - Solidarity: The Journal of Catholic Social Thought and Secular Ethics 8 (2):1-22.
    Kantian Deontological Ethics concerns itself with the will as grounded in universalisable maxims. Such maxims are in turn based on rationally conceived laws that, in a professional setting, find expression in the autonomously made agreements constituting professional protocols and regulations. When applied to a case-study wherein public safety has been possibly jeopardised by company products, we can argue for priority in the agreed-to responsibility towards the good of professional autonomy, expressed as a rational mandate of nondisclosure of confidential product information, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. In two minds: a casebook of psychiatric ethics.Donna Dickenson, Bill Fulford & K. W. M. Fulford - 2000 - Oxford: Oxford University Press. Edited by K. W. M. Fulford.
    In Two Minds is a practical casebook of problem solving in psychiatric ethics. Written in a lively and accessible style, it builds on a series of detailed case histories to illustrate the central place of ethical reasoning as a key competency for clinical work and research in psychiatry. Topics include risk, dangerousness and confidentiality; judgements of responsibility; involuntary treatment and mental health legislation; consent to genetic screening; dual role issues in child and adolescent psychiatry; needs assessment; cross-cultural and gender (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. Personality and Islamic religiosity: Preliminary survey data of Bruneian Malay Muslim university students and their psychological well-being, unethical behavior, and dark triad traits.Nur Amali Aminnuddin - 2020 - Data in Brief 30:105486.
    The paper presents data collected using measures of personality, Islamic religiosity, psychological well-being, unethical behavior, and dark triad traits. The sample consists 277 Bruneian Malay Muslim university students. The participants were sampled at a public university in Brunei. Through cooperation with faculty members, a link to the online questionnaire was posted on the learning management system platform. The targeted population was informed they were invited to participate voluntarily, and all information would be confidential. Completed questionnaires were submitted by 171 females (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Teaching medical ethics and law within medical education: a model for the UK core curriculum.Richard Ashcroft & Donna Dickenson - 1998 - Journal of Medical Ethics 24:188-192.
    Consensus statement by UK teachers of medical ethics and law.
    Download  
     
    Export citation  
     
    Bookmark  
  40.  54
    Should the World be There?Frode Alson Bjørdal - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  41. ‘We may still not be ready for newer healthcare technologies’: An ethical perspective of privacy concerns.David Appiah & Duut Jamal-Deen Majeed - manuscript
    As healthcare technologies rapidly progress, a paramount concern arises: are individuals adequately prepared for the current challenges accompanying these advancements? Despite regulatory measures in place, the persistent issue of privacy demands heightened attention and prioritization. This essay aims to consistently underscore the significance of privacy in the evolving landscape of healthcare technologies, fostering a future where the advantages of these innovations are managed with responsibility. We present an ethical analysis addressing privacy apprehensions in emerging healthcare technologies, accompanied by recommendations for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. All of Life Is Here.Trevor Stammers - 2017 - The New Bioethics 23 (2):105-106.
    A review of the range of articles in the summer issue of The New Bioethics.
    Download  
     
    Export citation  
     
    Bookmark